Vulnerability Details : CVE-2023-6548
Potential exploit
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
Vulnerability category: Execute code
Products affected by CVE-2023-6548
- Citrix » Netscaler Application Delivery Controller »Versions from including (>=) 13.1 and before (<) 13.1-51.15cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
- Citrix » Netscaler Application Delivery Controller »Versions from including (>=) 14.1 and before (<) 14.1-12.35cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
- Citrix » Netscaler Application Delivery Controller » Fips EditionVersions from including (>=) 13.1 and before (<) 13.1-37.176cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
- Citrix » Netscaler Application Delivery Controller » Ndcpp EditionVersions from including (>=) 12.1 and before (<) 12.1-55.302cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
- Citrix » Netscaler Application Delivery Controller » Fips EditionVersions from including (>=) 12.1 and before (<) 12.1-55.302cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
- Citrix » Netscaler Application Delivery Controller »Versions from including (>=) 13.0 and before (<) 13.0-92.21cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
- cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
CVE-2023-6548 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
CISA required action:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CISA description:
Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.
Notes:
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6548
Added on
2024-01-17
Action due date
2024-01-24
Exploit prediction scoring system (EPSS) score for CVE-2023-6548
1.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6548
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-01-25 |
5.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.1
|
3.4
|
Citrix Systems, Inc. | 2024-01-17 |
CWE ids for CVE-2023-6548
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by:
- nvd@nist.gov (Primary)
- secure@citrix.com (Secondary)
References for CVE-2023-6548
-
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549Vendor Advisory
Jump to